Add References
Slides 4-5: Explain how the Expectation of Privacy impacts the exercise of police power under the 4th Amendment
Slides 6-9: Define and explain the following types of exceptions, providing a factual example where each would apply: Plain view, open fields, abandonment, Terry Stop, Terry Frisk
Author: admin
-
The Impact of the Expectation of Privacy on Police Power and Exceptions under the 4th Amendment References: 1. “The Impact of the Fourth Amendment on Police Power.” Legal Information Institute, Cornell Law School, www.law.cornell.edu
-
“Observing Social Interactions and Deviant Behavior at a Local Coffee Shop” Title: “Observing Social Interactions and Breaking Norms: A Sociological Perspective”
Here are the requirements for the assignment, just in case I upload a screenshot of the assignment to the file.
Step #1: Find a “Field Site”
In order to focus your efforts, you need to find people and interactions to observe and engage. We call this a “field site,” where you can witness groups, people and interactions. You will be required to attend this site ALONE. Examples of places include: a sporting event, a coffee shop, a food court, a park, the mall, a farmer’s market, the beach, the airport, or any place where there are enough people around. You may need to switch your field site if there is not enough action or interaction. Step #2: Conduct a 30-Minute Observation
When you have found your “field site,” go ALONE and conduct a 30-minute observation. Look for particular people you can watch and “get to know” just by observing them and their interactions. Take notes on paper, a laptop, a phone, etc. about everything you see. Make sure you stay for thirty minutes to really get to know your site. While you observe, make sure to focus on the following (you’ll write about this all in Step #4):
Identify and describe the field site (location). What are the sounds, smells, and sights you see? When did you go (time and date)? Be as detailed as possible in your descriiption of the field site.
What social norms (folkways, mores, taboos, and laws) do you see occurring in the field site? Are people following these norms? How do you know? Do you see anyone violating/breaking them? How do you know? What sanctions do you see taking place (think rewards and punishments)?
What kinds of individuals do you see? What are their roles? What are their statuses and what status symbols do you observe? How are they behaving in their roles? Are their role performances successful…or strained? Choose ONE specific individual to focus on/write about in Step #4.
What kinds of social interactions do you see? Who are the individuals, how are they interacting, and why do their interactions catch your attention? What conclusions can you make about the people you’ve been watching just by observing them? Choose ONE specific interaction to focus on/write about in Step #4..
Step #3: Engage in “Deviant Behavior”
When you have finished observing your site, choose one particular norm that you want to intentionally “break” for the purposes of the assignment. Remember, please do not break a law. Otherwise, you run the risk of legal sanctions! Go ahead…engage in your chosen deviant behavior! As you do so, note the following (you’ll write about this all in Step #4):
What specific norm did you choose to break in the setting? Why did you choose that norm?
Describe what happened during the breaking of your chosen norm. Be specific.
What was it like engaging in your choice of deviant behavior? How did you feel?
What sanctions took place when you were breaking the norm or after you engaged in the deviant behavior (think rewards and/or punishments)?
Step #4: Report the Results & Apply the Sociological Imagination
Once you have finished your observation and deviant behavior, it is time to report your results. Please be as detailed as possible, write in complete sentences (no bullet points) and make sure to answer ALL questions using this format below:
First, address the four points in Step #2:
Identify and describe the field site (location). What are the sounds, smells, and sights you see? When did you go (time and date)? Be as detailed as possible in your descriiption of the field site.
What social norms (folkways, mores, taboos, and laws) do you see occurring in the field site? Are people following these norms? How do you know? Do you see anyone violating/breaking them? How do you know? What sanctions do you see taking place (think rewards and punishments)?
What kinds of individuals do you see? What are their roles? What are their statuses and what status symbols do you observe? How are they behaving in their roles? Are their role performances successful…or strained? Choose ONE specific individual to write about in detail.
What kinds of social interactions do you see? Who are the individuals, how are they interacting, and why do their interactions catch your attention? What conclusions can you make about the people you’ve been watching just by observing them? Choose ONE specific interaction to write about in detail.
Overall, what was it like to sit and observe others? Did you like/dislike conducting field work? Would you consider doing observations as a career? Why or why not?
Next, address the four points in Step #3:
What specific norm did you choose to break in the setting? Why did you choose that norm?
Describe what happened during the breaking of your chosen norm. Be specific!
What was it like engaging in your choice of deviant behavior? How did you feel?
What sanctions took place when you were breaking the norm or after you engaged in the deviant behavior (think rewards and/or punishments)?
How does having a sociological lens help you understand engaging in your deviant behavior and the sanctions that took place? -
Title: The Moral Dilemma of Putting a Price Tag on Human Lives: A Utilitarian Perspective on the Pinto Case
(3) Justice: What’s The Right Thing To Do? Episode 02: “PUTTING A PRICE TAG ON LIFE” – YouTube
Watch the Pinto case and the cost benefit analysis discussed in the first part of this video.
Is it moral to put a price tag on human lives? Why?
How can Utilitarianism help in this Pinto case? -
The Controversy of Reconstruction: Success or Failure? Reconstruction, the period following the Civil War in which the United States attempted to rebuild and reunite a divided nation, is a topic that continues to spark debate and controversy. Some argue that
Reconstruction was a pivotal point in American history, which is why this class starts with it. But, it is also extremely controversial. Was Reconstruction overall a success or a failure? Make an argument for your perspective on it (taking into consideration the different things Reconstruction set out to do). Then comment on your classmates’ posts, and discuss how and when Reconstruction failed or succeeded.
Remember, be civil. You are welcome to disagree: this will be a boring discussion if you don’t! But don’t attack each other. -
Title: The Ethics of Immigration: A Kantian Perspective Contemporary Moral Issue: Immigration has been a contentious and highly debated topic in our society, with conflicting views on how to address the influx of immigrants into countries. The moral implications of immigration
Cite a contemporary moral issue in our society. Apply ONE ethical theory learned in class to judge this moral issue. Use the theory’s claims in each paragraph to back up and support your arguments. This essay must be a fresh/new essay. It cannot be your Utilitarian paper again.
You must have a minimum of five paragraphs. -
“Securing Corporation Techs’ Network: Firewall Selection and DMZ Implementation” “Exploring the Impact of Social Media on Society: A Comprehensive Analysis”
SCENARIO
The Corporation Techs’ current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.
The senior network architect has asked you to create a network design that includes the following components:
-Current infrastructure elements
-A logical topology that separates the Accounting and Sales departments
-Redundant communications
-Justification for continuing with IPv4 or upgrading to IPv6
TASKS 1
For this part of the project, perform the following tasks:
1.Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.
2.Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, gateways) and their locations within the private and protected network segments.
3.Include a high-level plan that ensures communications are available 24/7.
4.Recommend whether to continue using IPv4 or upgrade to IPv6, and explain why.
5.Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network. The diagram will be very high level at this stage and include only necessary details. You may use a software tool or simply pencil and paper. You will update this design later in the project.
6.Create a draft report detailing all information as supportive documentation.
7.Cite sources, where appropriate.
***ONLY TASK 2 for this assignment. Task 1 is provided to gather some prior idea*****
Task 2:
Project Part 2: Firewall Selection and Placement
ScenarioThe senior network architect at Corporation Techs has informed you that the existing border firewall is old and needs to be replaced. He recommends designing a demilitarized zone (DMZ) to increase network perimeter security. He also wants to increase the security of network authentication, replacing the current username and password approach.
TasksFor this part of the project, perform the following tasks:
1.Research and select firewalls for the Corporation Techs network.
a.Describe each firewall, why you selected it, and where it should be placed for maximum effectiveness.
b.Address network, server, and workstation firewalls.
2.Describe a plan for creating a DMZ, and explain how it makes the network more secure.
3.Research network authentication and create a high-level plan for secure authentication to internal network resources.
4.Create a draft report detailing all information as supportive documentation.
5.Cite sources, where appropriate.
Required ResourcesInternet access
Submission RequirementsFormat: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Length of report: 3–4 pages
Self-Assessment ChecklistI researched and selected firewalls.
I described each firewall, why I selected it, and where it should be placed for maximum effectiveness.
I addressed network, server, and workstation firewalls.
I described a plan for creating a DMZ and explained how it makes the network more secure.
I created a high-level plan for secure authentication to internal network resources.
I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
I followed the submission guidelines.
***NO plagiarism Please***
I am sharing my network diagram which has firewalls in place. Please check if it is correct, feel free to update that for part II. -
IRB Exemption Categories and Rationale for Selection Rationale for IRB Exemption Categories and Selection: A Study on the Impact of Educational Practices on Student Learning and Teacher Assessment “Exploring Ethical Considerations in Research: Examining Exemptions and Protections for Human Subjects” “Ensuring Ethical Conduct in Human Subjects Research: Considerations for Exempt Categories 6, 7, and 8”
3. Referring to the explanations on the next page, please check the category (or categories) of exemption that describe(s) your research:
1 2 3 4 5 6 7 8
4. Please provide a rationale for the category or categories you have selected in Question 3. (Note: If you selected category 2, please be sure to indicate whether the data you collect is linked to participant names or other identifying information. Will unique identification codes be created? Who has access to information linking unique identifiers to actual participants’ names? Where will such information be stored?)
5. Please describe your research project. Include information on research participants/human subjects, recruitment, data collection procedures, and data storage.
EXEMPTION CATEGORIES EXPLAINED BELOW
IRB Exemption Categories
Which exemption category (ies) applies to your research? (Please read and determine and indicate on question 3):
(1) Research conducted in established or commonly accepted educational settings, that specifically involves normal educational practices that are not likely to adversely impact students’ opportunity to learn required educational content or the assessment of educators who provide instruction. This includes most research on regular and special education instructional strategies, and research on the effectiveness of or the comparison among instructional techniques, curricula, or classroom management methods.
(2)Research that only includes interactions involving educational tests (cognitive, diagnostic, aptitude, achievement), survey procedures, interview procedures or observation of public behavior (including visual or auditory recording) if at least one of the following criteria is met:
(i) The information obtained is recorded by the investigator in such a manner that the identity of the human subjects cannot readily be ascertained, directly or through identifiers linked to the subjects;
(ii) Any disclosure of the human subjects’ responses outside the research would not reasonably place the subjects at risk of criminal or civil liability or be damaging to the subjects’ financial standing, employability, educational advancement, or reputation; or
(iii) The information obtained is recorded by the investigator in such a manner that the identity of the human subjects can readily be ascertained, directly or through identifiers linked to the subjects, and an IRB conducts a limited IRB review to make the determination required by 45 CFR 46.111 (a)(7). (REQUIRES LIMITED IRB REVIEW OF PRIVACY AND CONFIDENTIALITY).
(3)(i) Research involving benign behavioral interventions in conjunction with the collection of information from an adult subject through verbal or written responses (including data entry) or audiovisual recording if the subject prospectively agrees to the
intervention and information collection and at least one of the following criteria is met:
(A) The information obtained is recorded by the investigator in such a manner that the identity of the human subjects cannot readily be ascertained, directly or through identifiers linked to the subjects;
(B) Any disclosure of the human subjects’ responses outside the research would not reasonably place the subjects at risk of criminal or civil liability or be damaging to the subjects’ financial standing, employability, educational advancement, or reputation; or
(C) The information obtained is recorded by the investigator in such a manner that the identity of the human subjects can readily be ascertained, directly or through identifiers linked to the subjects, and an IRB conducts a limited IRB review to make the determination required by 45 CFR 46.111(a)(7). (REQUIRES LIMITED IRB REVIEW OF PRIVACY AND CONFIDENTIALITY).
(ii) For the purposes of this provision, benign behavioral interventions are brief in duration, harmless, painless, not physically invasive, not likely to have a significant adverse lasting impact on the subjects, and the investigator has no reason to think the subjects will find the interventions offensive or embarrassing. Provided all such criteria are met, examples of such benign interventions would include having the subjects play an online game, having them solve puzzles under various noise conditions or having them decide how to allocate a nominal amount of received cash between themselves and someone else.
(iii) If the research involves deceiving the subjects regarding the nature or purposes of the research, this exemption is not applicable unless the subject authorizes the deception through a prospective agreement to participate in the research in circumstances in which the subject is informed that he or she will be unaware of or misled regarding the nature or purposes of the research.
(4) Secondary research for which consent is not required: secondary research uses of identifiable private information or identifiable biospecimens, if at least one of the following criteria is met:
(i) The identifiable private information or identifiable biospecimens are publicly available;
(ii) Information, which may include information about biospecimens, is recorded by the investigator in such a manner that the identity of the human subjects cannot readily be ascertained directly or through identifiers linked to the subjects, the investigator does not contact the subjects, and the investigator will not re-identify subjects;
(iii) The research involves only information collection and analysis involving the investigator’s use of identifiable health information when that use is regulated under 45 CFR parts 160 and 164, subparts A and E, for the purposes of “health care operations” or “research” as those terms are defined at 45 CFR 164.501 or for “public health activities and purposes” as described under 45 CFR 164.512(b); or
(iv) The research is conducted by, or on behalf of, a Federal department or agency using government-generated or government- collected information obtained for nonresearch activities, if the research generates identifiable private information that is or will be maintained on information technology that is subject to and in compliance with section 208(b) of the E-Government Act of 2020, 44 U.S.C. 3501 note, if all of the identifiable private information collected, used, or generated as part of the activity will be maintained in systems of records subject to the Privacy Act of 1974, 4 U.S.C. 552a, and if applicable, the information used in the research was collected subject to the Paperwork Reduction act of 1995, 44 U.S.C. 3501 et seq.
(5) Research and demonstration projects that are conducted or supported by a Federal department or agency, or otherwise subject to the approval of department or agency heads (or the approval of the heads of bureaus or other subordinate agencies that have been delegated authority to conduct the research and demonstration projects), and that are designed to study, evaluate, improve, or otherwise examine public benefit or service programs, including procedures for obtaining benefits or services under those programs, possible changes in or alternatives to those programs or procedures, or possible changes in methods or levels of payment for benefits or services under those programs. Such projects include, but are not limited to, internal studies by federal employees, and studies under contracts or consulting arrangements, cooperative agreements, or grants. Exempt projects also include waivers of otherwise mandatory requirements using authorities such as section 1115 and 1115A of the Social Security Act, as amended.
(i) Each Federal department or agency conducting or supporting the research and demonstration projects must establish, on a publically accessible Federal web site or in such other manner as the department or agency head may determine, a list of the research and demonstration projects that the federal department or agency conducts or supports under this provision. The research or demonstration project must be published on this list prior to commencing the research involving human subjects.
(6) Taste and food quality evaluation and consumer acceptance studies:
(i) if wholesome foods without additives are consumed, or
(ii) if a food is consumed that contains a food ingredient at or below the level and for a use found to be safe, or agricultural
chemical or environmental contaminant at or below the level found to be safe, by the Food and Drug Administration or approved by the Environmental Protection Agency or the Food Safety and Inspection Service of the U.S. Department of Agriculture.
(7) Storage or maintenance for secondary research for which broad consent is required: storage or maintenance of identifiable private information or identifiable biospecimens for potential secondary research use if an IRB conducts a limited IRB review and makes the determinations required by 45 CFR 46.111(a)(8). (REQUIRES LIMITED IRB REVIEW FOR PRIVACY AND CONFIDENTIALITY AND BROAD CONSENT).
(8) Secondary research for which broad consent is required: Research involving the use of identifiable private information or identifiable biospecimens for secondary research use, if the following criteria are met:
(i) Broad consent for the storage, maintenance, and secondary research use of the identifiable private information or identifiable biospecimens was obtained in accordance with 45 CFR 46.116(a)(1) through (4), (a)(6), and (d);
(ii) Documentation of informed consent or waiver of documentation of consent was obtained in accordance with 45 CFR 46.117;
(iii) An IRB conducts a limited IRB review and makes the determination required by 45 CFR 46.111(a)(7) and makes the determination that the research to be conducted is within the scope of the broad consent referenced in paragraph (d)(8)(i) of this section: and
(iv) The investigator does not include returning individual research results to subjects as part of the study plan. This provision does not prevent an investigator from abiding by any legal requirements to return individual research results.
(LIMITED IRB REVIEW REQUIRED FOR PRIVACY AND CONFIDENTIALITY AND THE SCOPE OF THE BROAD CONSENT).
Research exempt from IRB review MUST only involve one or more of the following research categories. Research that contains elements of exempt and non-exempt activities is NOT eligible for IRB exemption.
Categories 2, 3, 7, and 8 may require additional limited review. Limited review is required when:
• The information obtained is recorded by the investigator in such a manner that the identity of the human subject can readily be ascertained, directly or through identifiers linked to the subjects,
AND
• Any disclosure of the human subjects’ responses outside the research would reasonably place the subjects at risk of criminal or civil liability or be damaging to the subjects’ financial standing, employability, education advancement, or reputation.
For exempt categories 7 and 8, limited review is always required. It is also important to remember that exempt categories 7 and 8 are only available for use when board consent will be (or has been) obtained.
udent data collected from previously conducted surveys -
Annotated Bibliography for Portfolio Project on [Topic]
You will have at least eight articles in your annotated bibliography relating to the topic you’ve chosen for your Portfolio Project. (A minimum of 10 articles are required for support in the Portfolio Project.) Submit your updated annotated bibliography to your instructor for feedback.
Portfolio Project and articles listed under references in the file attached -
Communication Problem Analysis Improving Communication through Self Disclosure
Instructions
The Communication Problem Analysis is a written assignment that asks you to write about a problem you are having in communication with another person in your life. It can be a large problem or a small one. Read through the instructions on the assignment sheet below. I have also included a Communication Problem Analysis student sample below, which should give you a good idea what I am looking for. This assignment asks you to analyze one aspect of the communication skills you have learned this semester. Please follow the steps below. See the sample for an idea how long and how detailed your answers should be.
Communication Problem Analysis
Choose one problem that you currently have with communication with one person in your life.
The Problem
1. Who the person is you have chosen?
just the name goes here
2. Briefly describe your relationship with that person
You have two questions to answer here: How do you know them? What is your relationship like?
3. Describe (with examples) the communication problem you are having with that person.
4. Write out a sample dialogue, a typical conversation you have had with that person that illustrates the problem you are having.
it doesn’t have to be an actual word for word conversation. Just give an example of what a typical conversation that illustrates the problem would sound like
name statement
________: ______________________________________________________________
________: ______________________________________________________________
Etc.
5. Choose one communication topic from this class that relates to the problem you are having and list it here.
For example, it could be one of the following topics: (please choose only one).
distorted self concept
self fulfilling prophecy
perception checking
difference between hearing and listening
why humans are poor listeners
types of nonlistening
Self Disclosure
Knapp’s Stages of Relationship Development
Johari Window
Communication climate
Confirming and disconfirming communication
Defensiveness
Defense mechanisms
Conflict styles
6. Relate that topic (the same one listed in #5) to the communication problem you have described in #3.
in this section, you want to show me that you know that topic from class and what it means. You also need to show how it relates to your own experience
7. How could the problem be improved?
What can YOU do to help solve the problem, even if it is not you that is primarily at fault? It can be something you have learned in class, or an idea you have the might work. Don’t tell me what the other person should do, like “Bob needs to stop being a jerk.” This isn’t Bob’s paper. It is true that he is being a jerk, but what can you do to facilitate a better relationship? In an extreme case, the only thing you might be able to do is leave the relationship.
8. Write out a sample dialogue, how the conversation might go in its
improved form.
name statement
________: ______________________________________________________________
________: ______________________________________________________________
Student Sample
The Problem
1. Who the person is you have chosen?
Bob Cooke
2. Briefly describe your relationship with that person
How do you know them? What is your relationship like?
Bob is my brother-in-law. He has been married to my sister for the past 17 years. We have a cold and distant relationship.
3. Describe (with examples) the communication problem you are having with that person.
The problem I am having is that Bob does not seem to want to talk to me. I try to talk to him and he is busy, makes excuses in order to avoid me, walks away or simply ignores me. For example, when I was at his house for dinner last Sunday, I tried to talk to him and he told me he was busy, walked into the garage and started working on his car. He closed the door when I tried to follow him in there.
4. Write out a sample dialogue, a typical conversation you have had with that person that illustrates the problem you are having.
Nancy: Hey Bob, it’s great to see you! How are things going?
Bob: I’m doing fine. I’m actually really busy right now.
Nancy: What are you up to?
Bob: I’m working on my car project. I don’t have time to talk
Nancy: But I haven’t seen you in a while and I just want to catch up
Bob: I have to go.
Nancy: But Bob, I really want to talk to you
Bob: Why don’t you help your sister in the kitchen? I’m going in the garage Nancy: Can I come with you?
Bob: (walks into the garage and slams the door)
5. Choose ONE communication topic from this class that relates to the problem you are having.
Self Disclosure
6. Relate that topic (the same one listed in #5) to the communication problem you have described in #3.
I chose self disclosure because I believe this topic from class relates to the problem I am having. Self Disclosure is the process of revealing personal information about yourself. One of the characteristics of self disclosure is that it is necessary for relationship growth. I feel like my relationship with Bob is cold and distant because he is uncomfortable with self disclosure. We also learned in class that unbalanced self disclosure can make one partner in the relationship uncomfortable. I certainly have felt uncomfortable in the relationship due to Bob’s lack of self disclosure.
7. How could the problem be improved? (what can YOU do to help solve the problem, even if it is not you that is primarily at fault).
I think I may be approaching Bob at a bad time. I should ask him to go out for a beer with me on a day of his choosing so it is a time when he is not busy working on his car. I can also ask my sister if she knows what I might have done to cause Bob to want to avoid me. If the problem is that Bob is uncomfortable with self disclosure, I should certainly respect his feelings. I can also gradually self disclose a little bit about myself. Since self disclosure is reciprocal, Bob may also begin to self disclose a little bit also.
8. Write out a sample dialogue, how the conversation might go in its improved form.
Nancy: Hey, Bob, Its great to see you! How’s it going?
Bob: I’m fine. I’m actually busy right now
Nancy: Oh, well in that case, maybe we can chat later in the week
Bob: I guess that would be alright
Nancy: What evening works best for you?
Bob: Well, Heather works late on Thursdays, so that is probably best
Nancy: That works great for me. I’ll meet you at Hooley’s around 6:00 and I’ll buy you a beer
Bob: Ok, I will see you then.
Nancy: I’m looking forward to hearing more about your car project. -
“Alternate Processing Site Proposal for R&D Media, LLC” “Securing the Office: Implementing a Comprehensive Security Policy for Multimedia and Network Devices”
Instructions:
Assignment Overview – Alternate Processing Site Proposal
R&D Media, LLC has asked you to develop a proposal for an Alternate Processing Site. Your task is to:
Conduct research on the latest technologies and strategies for Alternate Processing Sites (feel free to use your teamwork for this part of the assignment).
Determine who the company’s stakeholders are. You can adopt the role of an internal or external consultant for your perspective.
Using the results of your research, develop a technical proposal that best addresses the stakeholder’s requirements and incorporates innovative technologies in the recommendation.
Within your proposal you must also consider cost and what R&D Media, LLC can afford.
Develop and document the requirements for R&D Media, LLC’s alternate processing site building upon the concepts addressed in class materials and discussion topics.
Assignment Checklist – Be sure that you capture the following eleven sections in your report:
The needs of R&D Media, LLC’s stakeholders are considered within the plan.
List of mission critical applications/list of non-critical functions that can be dropped and describe how data will be protected through encryption and other means.
New technologies for Alternate Processing Sites are utilized.
A plan for updating alternate processing site software during normal operation.
Documentation showing a simple rack diagram and a network diagram.
A network configuration overview (IP, DNS, etc.).
Information security architecture (firewalls, VPNs).
Network bandwidth estimates.
Power consumption estimates.
Plan for cutting over to the alternate plan during a recovery scenario.
Plan for cutting back to the main site (a.k.a. hand back) to resume normal operations.
Scenario:
R&D Media, LLC
R&D Media, LLC is a small 100-person business that produces short animation movies for advertiser clients. Their clients are located worldwide and need to communicate securely with R&D Media, LLC as they collaborate on their advertising shorts. R&D Media, LLC uses its high- speed Internet connection both to support the exchange of movie shorts as well as for email and general Internet web connectivity.
Local Area Network and Workstation Description
The business occupies one floor in an office building which is supported by a LAN. Everybody has a work computer on his or her desk, which can contain unshared work. There are also servers to support web, file and print sharing, email, database services. Additionally, a small 3D render farm (consisting of a rack of 20 quad processor Xeon® servers running Red Hat® Linux) generates high-resolution video animations that R&D Media, LLC produces for its clients.
The desktop systems consist of Apple® Mac® Pro desktops running the latest version of the Mac OS for the creative staff, and the latest version of Windows on computers for general use. The servers are running the latest version of Windows Server running Microsoft Exchange®, web server, and file and print service.
Remote Devices and External Network Connectivity
Ethernet and the network hardware are a mixture from Cisco® and Hewlett-Packard®. Employees, business partners, and clients may visit R&D Media, LLC’s office with laptop computers in order to collaborate on projects that connect with LAN. The laptops will obtain their IP configuration from the DHCP server at R&D Media, LLC.
R&D Media, LLC has 10 megabit/second Internet access and uses a SOHO firewall that doubles as a DHCP server. This firewall filters out Internet-based attempts to access R&D Media, LLC’s servers and desktop computers, but admits email, web, and SFTP (Secure FTP) traffic destined for specifically hardened servers.
The network has the following additional specifications:
The network is all TCP/IP based using Cisco routers and switches.
All desktop computers include email, web, database access, and office productivity software.
All server and critical network equipment are in a secure server room, with some connected peripheral devices (e.g., printers) located throughout the office.
The multimedia department uses high-end workstations for video rendering and animation with authoring software installed.
A load-balancing dual firewall connects the network to the Internet.
Security Policy Details
All email must be secured so it cannot be inadvertently sent to the wrong party or intercepted, including use of encryption for confidential information.
All network resources and equipment must be password protected.
Company equipment may not be used for personal business and only limited personal use.
All Windows-based PCs must run approved anti-malware programs.
Clients may use the Secure FTP (SFTP) server to send or receive multimedia files, but under no circumstances should one client be able to view the files of any other client.
The mail server must be configured not to forward email that originated on the Internet.
Password aging must be enforced on all servers and desktops.
All server configurations must be readily available to rebuild a failed system.
Offsite backup is required, with 24/7 access to that location.
All employees will demonstrate they understand the security policy as set by a security officer who reports to company leadership.
Requirements:
Your paper should be 8–10 pages of content, in APA and include a cover sheet, table of contents, abstract, and reference pages. Be sure to document your content with proper APA in text citations that match your reference list.
Answers contain sufficient information to adequately answer the questions
No spelling errors
No grammar errors